Resubmissions
14-01-2025 05:35
250114-gaenbszqam 1010-01-2025 23:50
250110-3vv2pswmhj 1011-12-2024 15:19
241211-sqgcmssnbr 1009-12-2024 01:54
241209-cbqprsxngx 1026-11-2024 23:15
241126-28wpqa1ndp 1030-09-2024 21:45
240930-1l2rsazhpg 1015-09-2024 22:03
240915-1yl7vsvbpf 1015-09-2024 20:03
240915-ystcwa1elr 1020-08-2024 16:21
240820-ttt9cawalj 10Analysis
-
max time kernel
1560s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 01:54
Static task
static1
Behavioral task
behavioral1
Sample
v2.bin(1).zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
v2.bin(1).zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
v2.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
v2.exe
Resource
win10v2004-20241007-en
General
-
Target
v2.bin(1).zip
-
Size
73KB
-
MD5
620fd461cab821f478f7cce1bf06d1ac
-
SHA1
a083516b5a275a2e9141f68a99ab4878632c5552
-
SHA256
f442d0543f6df79be9fbaed90af2dedbcf2e4774561421763577b148a9ff8554
-
SHA512
9ad7d4f17e156e21885c89b242430a06652ea8bdc45b22dc64f23efe8c2f6391ac5556c5e2bd14cf46d5bd8cb8dbb89f714466eef348dcb19ad16f3175dd3117
-
SSDEEP
1536:yJrdZ1PgFel3BJmc11f0MPxwX5o2CfFGm8SXZRObA:yJJZ1cKxJm+bZGCfFjpRObA
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\reloc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\reloc_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\reloc_auto_file\shell\open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\reloc_auto_file\shell\edit\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\reloc_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\reloc_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\reloc_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.reloc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\.reloc\ = "reloc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\reloc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_CLASSES\reloc_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2708 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2708 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 2708 7zFM.exe Token: 35 2708 7zFM.exe Token: SeSecurityPrivilege 2708 7zFM.exe Token: SeSecurityPrivilege 2708 7zFM.exe Token: SeSecurityPrivilege 2708 7zFM.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2708 7zFM.exe 2708 7zFM.exe 2708 7zFM.exe 2708 7zFM.exe 2708 7zFM.exe 2708 7zFM.exe 2708 7zFM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2708 wrote to memory of 1128 2708 7zFM.exe 31 PID 2708 wrote to memory of 1128 2708 7zFM.exe 31 PID 2708 wrote to memory of 1128 2708 7zFM.exe 31 PID 1128 wrote to memory of 2816 1128 rundll32.exe 32 PID 1128 wrote to memory of 2816 1128 rundll32.exe 32 PID 1128 wrote to memory of 2816 1128 rundll32.exe 32
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\v2.bin(1).zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\7zO49AA7AB7\.reloc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO49AA7AB7\.reloc3⤵PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD537eca68cd795bb195a682fc3801d35aa
SHA1b3d93cdff6b2040cf1b055a1db1755e44ea7622e
SHA2563b67482ffde6defd3650261ad65d1a70d63226614d783bcec445db47ef4dd200
SHA51270369edf9d747347691fc0a446e7ebe0aeba26851c1542c80b4c8cf78474b204c7f9ee6c7e78f6b2562624debe9d98e1d3cee9ad573deeb91a097429c2012bb2